The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
Lee masBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
Lee masWhile the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
Lee masThis book argues that this standard image of the great German philosopher is radically wrong. Not only does Kant reflect ...
Lee masThe ability of stem cells to acquire different desired phenotypes has opened the door for a new discipline: regenerative ...
Lee masTissue engineering is gaining interest as it is applied for regeneration of organs to attain their lost function. Although ...
Lee masThis book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
Lee masthis book analyses patterns of internationalisation comprising the national and supranational level, the level of higher ...
Lee masBorders, Mobility and Technologies of Control provides a model of criminological inquiry that is global in scope, constructionist ...
Lee masThis book uses Pierre Bourdieu’s field theory as a lens through which to examine military operations. Novel in its approach, ...
Lee masThere are several crucial feedbacks from forests to the climate system. The mechanisms for those feedbacks are elaborated ...
Lee masThis volume adopts an ecosystems approach to understanding the world's boreal peatlands. It focuses on biogeochemical patterns ...
Lee masThe book considers the diverse experiences of urban and rural families before the war and the effects of the timing of their ...
Lee masBotanicals, which have been part of human food and medicine for thousands of years, are perceived as being safer than synthetic ...
Lee masThis easy-to-use book helps you acquire a wealth of fascinating information about plants. There are 130 pages with text, ...
Lee masBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
Lee masThe book is the result of intensive work of 43 authors, all of them leading scientists in the Botrytis sciences. New technologies ...
Lee masBoundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
Lee masThe book is rich in references and leaves no aspect of the problem untouched. The morphological, pharmacological, physiological ...
Lee masThis text is intended to provide an overview of brain death. The topics explored in this book are the concept and historical ...
Lee mas